Rail Operator website Hacked and Hackers asked to Pay Ransom in Bitcoins

Irsh rail operator website has been compromised and the attackers replaces the original websites files with a ransom note demanding to pay 1 bitcoin with 5 days.

Users who tried reaching the tram operator website last Tuesday saw a message claiming the website has been hacked and the company has taken the website down. Users are advised not to reach the website.

It appears more than 3,226 user records has been compromised in the cyber attack. The records are associated with the users who signed up to a Luas newsletter.

The ransom note displayed as follows

You are hacked
some time ago i wrote that you have serious security holes
you didn't reply
the next time someone talks to you, press the reply button
you must pay 1 bitcoin in 5 days
otherwise I will publish all data and send emails to your users
btc address: 3FsR4CTUmumBJK12Zk8QRwdpPTJEY11aSX

Luas confirmed no financial information has been compromised, and the company to contact the affected users within 24 hours.

Luas announced that website has been compromised and the malicious message added to the homepage of the website. We currently have technicians working on the issue.

The site is being analyzed to identify how the attack occurred and technicians are working to restore the service for the customer. Luas transportation was not affected by the attack.

The Attacker said he reported to tram operator about the security holes in the website, and the attack appears to be a defacement attack.

Luas said that they will update customers via twitter, Facebook, AA Roadwatch and the media if there are any changes to services.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

15,779 Indian Websites Hacked During This Year (Jan – Nov) – CERT-India

3000 Hacked Websites Access comes to Sale in Russian Underground Dark Web Marketplace

Indian Hackers Group Hacked & Encrypt Pakistan Website Files Using KCW Ransomware

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure…

30 minutes ago

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on…

41 minutes ago

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting…

2 hours ago

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge…

2 hours ago

Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025

Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 –…

2 hours ago

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling attackers…

3 hours ago